Many components of systems we use have had their security properties verified up to some level. However, combining proven secure components does commonly mean that their security properties are not preserved. In a world that has become so complex that we have to break up the design in smaller parts to keep the overview, this […]